
Cloud Vulnerability DB
A community-led vulnerabilities database
UReport v2.2.9 contains a directory traversal vulnerability (CVE-2023-24188) in its report deletion function. The vulnerability was discovered in January 2023 and affects the report deletion functionality of the software. UReport is a high-performance Java report engine based on Spring architecture, used for preparing complex Chinese-style statements and reports (GitHub UReport).
The vulnerability exists in the deletion function within the ureport2-core-2.2.9.jar file, specifically in the com.bstek.ureport.provider.report.file.deleteReport method. The issue stems from improper path handling where the application performs direct path concatenation without proper validation, enabling directory traversal attacks (Bug Report).
The vulnerability allows attackers to delete arbitrary files on the system through directory traversal. This poses a significant risk as it could lead to unauthorized deletion of critical system files or sensitive data (Bug Report).
Users should upgrade from UReport v2.2.9 to a newer version that addresses this vulnerability. If immediate upgrade is not possible, it is recommended to implement additional access controls and input validation for the file deletion functionality (CVE Mitre).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."